blob: c88ccbfda5f1b111a5fa43e1d1803bcccf95b521 [file] [log] [blame]
Patrick McHardy96518512013-10-14 11:00:02 +02001#ifndef _LINUX_NF_TABLES_H
2#define _LINUX_NF_TABLES_H
3
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +01004#define NFT_CHAIN_MAXNAMELEN 32
5#define NFT_USERDATA_MAXLEN 256
Patrick McHardy96518512013-10-14 11:00:02 +02006
7enum nft_registers {
8 NFT_REG_VERDICT,
9 NFT_REG_1,
10 NFT_REG_2,
11 NFT_REG_3,
12 NFT_REG_4,
13 __NFT_REG_MAX
14};
15#define NFT_REG_MAX (__NFT_REG_MAX - 1)
16
17/**
18 * enum nft_verdicts - nf_tables internal verdicts
19 *
20 * @NFT_CONTINUE: continue evaluation of the current rule
21 * @NFT_BREAK: terminate evaluation of the current rule
22 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
23 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
24 * @NFT_RETURN: return to the topmost chain on the jump stack
25 *
26 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
27 */
28enum nft_verdicts {
29 NFT_CONTINUE = -1,
30 NFT_BREAK = -2,
31 NFT_JUMP = -3,
32 NFT_GOTO = -4,
33 NFT_RETURN = -5,
34};
35
36/**
37 * enum nf_tables_msg_types - nf_tables netlink message types
38 *
39 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
40 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
41 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
42 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
43 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
44 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
45 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
46 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
47 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
Patrick McHardy20a69342013-10-11 12:06:22 +020048 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
49 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
50 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
51 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
52 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
53 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +020054 */
55enum nf_tables_msg_types {
56 NFT_MSG_NEWTABLE,
57 NFT_MSG_GETTABLE,
58 NFT_MSG_DELTABLE,
59 NFT_MSG_NEWCHAIN,
60 NFT_MSG_GETCHAIN,
61 NFT_MSG_DELCHAIN,
62 NFT_MSG_NEWRULE,
63 NFT_MSG_GETRULE,
64 NFT_MSG_DELRULE,
Patrick McHardy20a69342013-10-11 12:06:22 +020065 NFT_MSG_NEWSET,
66 NFT_MSG_GETSET,
67 NFT_MSG_DELSET,
68 NFT_MSG_NEWSETELEM,
69 NFT_MSG_GETSETELEM,
70 NFT_MSG_DELSETELEM,
Patrick McHardy96518512013-10-14 11:00:02 +020071 NFT_MSG_MAX,
72};
73
Patrick McHardy20a69342013-10-11 12:06:22 +020074/**
75 * enum nft_list_attributes - nf_tables generic list netlink attributes
76 *
77 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
78 */
Patrick McHardy96518512013-10-14 11:00:02 +020079enum nft_list_attributes {
80 NFTA_LIST_UNPEC,
81 NFTA_LIST_ELEM,
82 __NFTA_LIST_MAX
83};
84#define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
85
86/**
87 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
88 *
89 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
90 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
91 */
92enum nft_hook_attributes {
93 NFTA_HOOK_UNSPEC,
94 NFTA_HOOK_HOOKNUM,
95 NFTA_HOOK_PRIORITY,
96 __NFTA_HOOK_MAX
97};
98#define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
99
100/**
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200101 * enum nft_table_flags - nf_tables table flags
102 *
103 * @NFT_TABLE_F_DORMANT: this table is not active
104 */
105enum nft_table_flags {
106 NFT_TABLE_F_DORMANT = 0x1,
107};
108
109/**
Patrick McHardy96518512013-10-14 11:00:02 +0200110 * enum nft_table_attributes - nf_tables table netlink attributes
111 *
112 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200113 * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
Tomasz Bursztykad8bcc7682013-12-12 15:00:42 +0200114 * @NFTA_TABLE_USE: number of chains in this table (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200115 */
116enum nft_table_attributes {
117 NFTA_TABLE_UNSPEC,
118 NFTA_TABLE_NAME,
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200119 NFTA_TABLE_FLAGS,
Tomasz Bursztykad8bcc7682013-12-12 15:00:42 +0200120 NFTA_TABLE_USE,
Patrick McHardy96518512013-10-14 11:00:02 +0200121 __NFTA_TABLE_MAX
122};
123#define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
124
125/**
126 * enum nft_chain_attributes - nf_tables chain netlink attributes
127 *
128 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
129 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
130 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
131 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200132 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
133 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200134 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200135 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +0200136 */
137enum nft_chain_attributes {
138 NFTA_CHAIN_UNSPEC,
139 NFTA_CHAIN_TABLE,
140 NFTA_CHAIN_HANDLE,
141 NFTA_CHAIN_NAME,
142 NFTA_CHAIN_HOOK,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200143 NFTA_CHAIN_POLICY,
144 NFTA_CHAIN_USE,
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200145 NFTA_CHAIN_TYPE,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200146 NFTA_CHAIN_COUNTERS,
Patrick McHardy96518512013-10-14 11:00:02 +0200147 __NFTA_CHAIN_MAX
148};
149#define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
150
151/**
152 * enum nft_rule_attributes - nf_tables rule netlink attributes
153 *
154 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
155 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
156 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
157 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200158 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
Eric Leblond5e948462013-10-10 13:41:44 +0200159 * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64)
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +0100160 * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN)
Patrick McHardy96518512013-10-14 11:00:02 +0200161 */
162enum nft_rule_attributes {
163 NFTA_RULE_UNSPEC,
164 NFTA_RULE_TABLE,
165 NFTA_RULE_CHAIN,
166 NFTA_RULE_HANDLE,
167 NFTA_RULE_EXPRESSIONS,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200168 NFTA_RULE_COMPAT,
Eric Leblond5e948462013-10-10 13:41:44 +0200169 NFTA_RULE_POSITION,
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +0100170 NFTA_RULE_USERDATA,
Patrick McHardy96518512013-10-14 11:00:02 +0200171 __NFTA_RULE_MAX
172};
173#define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
174
Patrick McHardy20a69342013-10-11 12:06:22 +0200175/**
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200176 * enum nft_rule_compat_flags - nf_tables rule compat flags
177 *
178 * @NFT_RULE_COMPAT_F_INV: invert the check result
179 */
180enum nft_rule_compat_flags {
181 NFT_RULE_COMPAT_F_INV = (1 << 1),
182 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
183};
184
185/**
186 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
187 *
188 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
189 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
190 */
191enum nft_rule_compat_attributes {
192 NFTA_RULE_COMPAT_UNSPEC,
193 NFTA_RULE_COMPAT_PROTO,
194 NFTA_RULE_COMPAT_FLAGS,
195 __NFTA_RULE_COMPAT_MAX
196};
197#define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
198
199/**
Patrick McHardy20a69342013-10-11 12:06:22 +0200200 * enum nft_set_flags - nf_tables set flags
201 *
202 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
203 * @NFT_SET_CONSTANT: set contents may not change while bound
204 * @NFT_SET_INTERVAL: set contains intervals
205 * @NFT_SET_MAP: set is used as a dictionary
206 */
207enum nft_set_flags {
208 NFT_SET_ANONYMOUS = 0x1,
209 NFT_SET_CONSTANT = 0x2,
210 NFT_SET_INTERVAL = 0x4,
211 NFT_SET_MAP = 0x8,
212};
213
214/**
215 * enum nft_set_attributes - nf_tables set netlink attributes
216 *
217 * @NFTA_SET_TABLE: table name (NLA_STRING)
218 * @NFTA_SET_NAME: set name (NLA_STRING)
219 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
220 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
221 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
222 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
223 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
224 */
225enum nft_set_attributes {
226 NFTA_SET_UNSPEC,
227 NFTA_SET_TABLE,
228 NFTA_SET_NAME,
229 NFTA_SET_FLAGS,
230 NFTA_SET_KEY_TYPE,
231 NFTA_SET_KEY_LEN,
232 NFTA_SET_DATA_TYPE,
233 NFTA_SET_DATA_LEN,
234 __NFTA_SET_MAX
235};
236#define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
237
238/**
239 * enum nft_set_elem_flags - nf_tables set element flags
240 *
241 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
242 */
243enum nft_set_elem_flags {
244 NFT_SET_ELEM_INTERVAL_END = 0x1,
245};
246
247/**
248 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
249 *
250 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
251 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
252 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
253 */
254enum nft_set_elem_attributes {
255 NFTA_SET_ELEM_UNSPEC,
256 NFTA_SET_ELEM_KEY,
257 NFTA_SET_ELEM_DATA,
258 NFTA_SET_ELEM_FLAGS,
259 __NFTA_SET_ELEM_MAX
260};
261#define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
262
263/**
264 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
265 *
266 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
267 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
268 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
269 */
270enum nft_set_elem_list_attributes {
271 NFTA_SET_ELEM_LIST_UNSPEC,
272 NFTA_SET_ELEM_LIST_TABLE,
273 NFTA_SET_ELEM_LIST_SET,
274 NFTA_SET_ELEM_LIST_ELEMENTS,
275 __NFTA_SET_ELEM_LIST_MAX
276};
277#define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
278
279/**
280 * enum nft_data_types - nf_tables data types
281 *
282 * @NFT_DATA_VALUE: generic data
283 * @NFT_DATA_VERDICT: netfilter verdict
284 *
285 * The type of data is usually determined by the kernel directly and is not
286 * explicitly specified by userspace. The only difference are sets, where
287 * userspace specifies the key and mapping data types.
288 *
289 * The values 0xffffff00-0xffffffff are reserved for internally used types.
290 * The remaining range can be freely used by userspace to encode types, all
291 * values are equivalent to NFT_DATA_VALUE.
292 */
293enum nft_data_types {
294 NFT_DATA_VALUE,
295 NFT_DATA_VERDICT = 0xffffff00U,
296};
297
298#define NFT_DATA_RESERVED_MASK 0xffffff00U
299
300/**
301 * enum nft_data_attributes - nf_tables data netlink attributes
302 *
303 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
304 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
305 */
Patrick McHardy96518512013-10-14 11:00:02 +0200306enum nft_data_attributes {
307 NFTA_DATA_UNSPEC,
308 NFTA_DATA_VALUE,
309 NFTA_DATA_VERDICT,
310 __NFTA_DATA_MAX
311};
312#define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
313
314/**
315 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
316 *
317 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
318 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
319 */
320enum nft_verdict_attributes {
321 NFTA_VERDICT_UNSPEC,
322 NFTA_VERDICT_CODE,
323 NFTA_VERDICT_CHAIN,
324 __NFTA_VERDICT_MAX
325};
326#define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
327
328/**
329 * enum nft_expr_attributes - nf_tables expression netlink attributes
330 *
331 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
332 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
333 */
334enum nft_expr_attributes {
335 NFTA_EXPR_UNSPEC,
336 NFTA_EXPR_NAME,
337 NFTA_EXPR_DATA,
338 __NFTA_EXPR_MAX
339};
340#define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
341
342/**
343 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
344 *
345 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
346 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
347 */
348enum nft_immediate_attributes {
349 NFTA_IMMEDIATE_UNSPEC,
350 NFTA_IMMEDIATE_DREG,
351 NFTA_IMMEDIATE_DATA,
352 __NFTA_IMMEDIATE_MAX
353};
354#define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
355
356/**
357 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
358 *
359 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
360 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
361 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
362 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
363 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
364 *
365 * The bitwise expression performs the following operation:
366 *
367 * dreg = (sreg & mask) ^ xor
368 *
369 * which allow to express all bitwise operations:
370 *
371 * mask xor
372 * NOT: 1 1
373 * OR: 0 x
374 * XOR: 1 x
375 * AND: x 0
376 */
377enum nft_bitwise_attributes {
378 NFTA_BITWISE_UNSPEC,
379 NFTA_BITWISE_SREG,
380 NFTA_BITWISE_DREG,
381 NFTA_BITWISE_LEN,
382 NFTA_BITWISE_MASK,
383 NFTA_BITWISE_XOR,
384 __NFTA_BITWISE_MAX
385};
386#define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
387
388/**
389 * enum nft_byteorder_ops - nf_tables byteorder operators
390 *
391 * @NFT_BYTEORDER_NTOH: network to host operator
392 * @NFT_BYTEORDER_HTON: host to network opertaor
393 */
394enum nft_byteorder_ops {
395 NFT_BYTEORDER_NTOH,
396 NFT_BYTEORDER_HTON,
397};
398
399/**
400 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
401 *
402 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
403 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
404 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
405 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
406 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
407 */
408enum nft_byteorder_attributes {
409 NFTA_BYTEORDER_UNSPEC,
410 NFTA_BYTEORDER_SREG,
411 NFTA_BYTEORDER_DREG,
412 NFTA_BYTEORDER_OP,
413 NFTA_BYTEORDER_LEN,
414 NFTA_BYTEORDER_SIZE,
415 __NFTA_BYTEORDER_MAX
416};
417#define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
418
419/**
420 * enum nft_cmp_ops - nf_tables relational operator
421 *
422 * @NFT_CMP_EQ: equal
423 * @NFT_CMP_NEQ: not equal
424 * @NFT_CMP_LT: less than
425 * @NFT_CMP_LTE: less than or equal to
426 * @NFT_CMP_GT: greater than
427 * @NFT_CMP_GTE: greater than or equal to
428 */
429enum nft_cmp_ops {
430 NFT_CMP_EQ,
431 NFT_CMP_NEQ,
432 NFT_CMP_LT,
433 NFT_CMP_LTE,
434 NFT_CMP_GT,
435 NFT_CMP_GTE,
436};
437
438/**
439 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
440 *
441 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
442 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
443 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
444 */
445enum nft_cmp_attributes {
446 NFTA_CMP_UNSPEC,
447 NFTA_CMP_SREG,
448 NFTA_CMP_OP,
449 NFTA_CMP_DATA,
450 __NFTA_CMP_MAX
451};
452#define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
453
Patrick McHardy20a69342013-10-11 12:06:22 +0200454/**
455 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
456 *
457 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
458 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
459 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
460 */
461enum nft_lookup_attributes {
462 NFTA_LOOKUP_UNSPEC,
463 NFTA_LOOKUP_SET,
464 NFTA_LOOKUP_SREG,
465 NFTA_LOOKUP_DREG,
466 __NFTA_LOOKUP_MAX
Patrick McHardy96518512013-10-14 11:00:02 +0200467};
Patrick McHardy20a69342013-10-11 12:06:22 +0200468#define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
Patrick McHardy96518512013-10-14 11:00:02 +0200469
470/**
471 * enum nft_payload_bases - nf_tables payload expression offset bases
472 *
473 * @NFT_PAYLOAD_LL_HEADER: link layer header
474 * @NFT_PAYLOAD_NETWORK_HEADER: network header
475 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
476 */
477enum nft_payload_bases {
478 NFT_PAYLOAD_LL_HEADER,
479 NFT_PAYLOAD_NETWORK_HEADER,
480 NFT_PAYLOAD_TRANSPORT_HEADER,
481};
482
483/**
484 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
485 *
486 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
487 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
488 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
489 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
490 */
491enum nft_payload_attributes {
492 NFTA_PAYLOAD_UNSPEC,
493 NFTA_PAYLOAD_DREG,
494 NFTA_PAYLOAD_BASE,
495 NFTA_PAYLOAD_OFFSET,
496 NFTA_PAYLOAD_LEN,
497 __NFTA_PAYLOAD_MAX
498};
499#define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
500
501/**
502 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
503 *
504 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
505 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
506 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
507 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
508 */
509enum nft_exthdr_attributes {
510 NFTA_EXTHDR_UNSPEC,
511 NFTA_EXTHDR_DREG,
512 NFTA_EXTHDR_TYPE,
513 NFTA_EXTHDR_OFFSET,
514 NFTA_EXTHDR_LEN,
515 __NFTA_EXTHDR_MAX
516};
517#define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
518
519/**
520 * enum nft_meta_keys - nf_tables meta expression keys
521 *
522 * @NFT_META_LEN: packet length (skb->len)
523 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
524 * @NFT_META_PRIORITY: packet priority (skb->priority)
525 * @NFT_META_MARK: packet mark (skb->mark)
526 * @NFT_META_IIF: packet input interface index (dev->ifindex)
527 * @NFT_META_OIF: packet output interface index (dev->ifindex)
528 * @NFT_META_IIFNAME: packet input interface name (dev->name)
529 * @NFT_META_OIFNAME: packet output interface name (dev->name)
530 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
531 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
532 * @NFT_META_SKUID: originating socket UID (fsuid)
533 * @NFT_META_SKGID: originating socket GID (fsgid)
534 * @NFT_META_NFTRACE: packet nftrace bit
535 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
536 * @NFT_META_SECMARK: packet secmark (skb->secmark)
Patrick McHardy124edfa2014-01-03 12:16:17 +0000537 * @NFT_META_NFPROTO: netfilter protocol
Patrick McHardy4566bf22014-01-03 12:16:18 +0000538 * @NFT_META_L4PROTO: layer 4 protocol number
Patrick McHardy96518512013-10-14 11:00:02 +0200539 */
540enum nft_meta_keys {
541 NFT_META_LEN,
542 NFT_META_PROTOCOL,
543 NFT_META_PRIORITY,
544 NFT_META_MARK,
545 NFT_META_IIF,
546 NFT_META_OIF,
547 NFT_META_IIFNAME,
548 NFT_META_OIFNAME,
549 NFT_META_IIFTYPE,
550 NFT_META_OIFTYPE,
551 NFT_META_SKUID,
552 NFT_META_SKGID,
553 NFT_META_NFTRACE,
554 NFT_META_RTCLASSID,
555 NFT_META_SECMARK,
Patrick McHardy124edfa2014-01-03 12:16:17 +0000556 NFT_META_NFPROTO,
Patrick McHardy4566bf22014-01-03 12:16:18 +0000557 NFT_META_L4PROTO,
Patrick McHardy96518512013-10-14 11:00:02 +0200558};
559
560/**
561 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
562 *
563 * @NFTA_META_DREG: destination register (NLA_U32)
564 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
Arturo Borrero Gonzaleze035b772013-12-26 16:38:01 +0100565 * @NFTA_META_SREG: source register (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200566 */
567enum nft_meta_attributes {
568 NFTA_META_UNSPEC,
569 NFTA_META_DREG,
570 NFTA_META_KEY,
Arturo Borrero Gonzaleze035b772013-12-26 16:38:01 +0100571 NFTA_META_SREG,
Patrick McHardy96518512013-10-14 11:00:02 +0200572 __NFTA_META_MAX
573};
574#define NFTA_META_MAX (__NFTA_META_MAX - 1)
575
576/**
577 * enum nft_ct_keys - nf_tables ct expression keys
578 *
579 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
580 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
581 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
582 * @NFT_CT_MARK: conntrack mark value
583 * @NFT_CT_SECMARK: conntrack secmark value
584 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
585 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
586 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
587 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
588 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
589 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
590 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
591 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
592 */
593enum nft_ct_keys {
594 NFT_CT_STATE,
595 NFT_CT_DIRECTION,
596 NFT_CT_STATUS,
597 NFT_CT_MARK,
598 NFT_CT_SECMARK,
599 NFT_CT_EXPIRATION,
600 NFT_CT_HELPER,
601 NFT_CT_L3PROTOCOL,
602 NFT_CT_SRC,
603 NFT_CT_DST,
604 NFT_CT_PROTOCOL,
605 NFT_CT_PROTO_SRC,
606 NFT_CT_PROTO_DST,
Florian Westphald2bf2f32014-02-18 15:25:32 +0100607 NFT_CT_LABELS,
Patrick McHardy96518512013-10-14 11:00:02 +0200608};
609
610/**
611 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
612 *
613 * @NFTA_CT_DREG: destination register (NLA_U32)
614 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
615 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
Kristian Evensenc4ede3d2014-01-07 16:43:54 +0100616 * @NFTA_CT_SREG: source register (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200617 */
618enum nft_ct_attributes {
619 NFTA_CT_UNSPEC,
620 NFTA_CT_DREG,
621 NFTA_CT_KEY,
622 NFTA_CT_DIRECTION,
Kristian Evensenc4ede3d2014-01-07 16:43:54 +0100623 NFTA_CT_SREG,
Patrick McHardy96518512013-10-14 11:00:02 +0200624 __NFTA_CT_MAX
625};
626#define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
627
628/**
629 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
630 *
631 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
632 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
633 */
634enum nft_limit_attributes {
635 NFTA_LIMIT_UNSPEC,
636 NFTA_LIMIT_RATE,
637 NFTA_LIMIT_UNIT,
638 __NFTA_LIMIT_MAX
639};
640#define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
641
642/**
643 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
644 *
645 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
646 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
647 */
648enum nft_counter_attributes {
649 NFTA_COUNTER_UNSPEC,
650 NFTA_COUNTER_BYTES,
651 NFTA_COUNTER_PACKETS,
652 __NFTA_COUNTER_MAX
653};
654#define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
655
656/**
657 * enum nft_log_attributes - nf_tables log expression netlink attributes
658 *
659 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
660 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
661 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
662 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
663 */
664enum nft_log_attributes {
665 NFTA_LOG_UNSPEC,
666 NFTA_LOG_GROUP,
667 NFTA_LOG_PREFIX,
668 NFTA_LOG_SNAPLEN,
669 NFTA_LOG_QTHRESHOLD,
670 __NFTA_LOG_MAX
671};
672#define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
673
674/**
Eric Leblond0aff0782013-12-06 00:24:13 +0100675 * enum nft_queue_attributes - nf_tables queue expression netlink attributes
676 *
677 * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16)
678 * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16)
679 * @NFTA_QUEUE_FLAGS: various flags (NLA_U16)
680 */
681enum nft_queue_attributes {
682 NFTA_QUEUE_UNSPEC,
683 NFTA_QUEUE_NUM,
684 NFTA_QUEUE_TOTAL,
685 NFTA_QUEUE_FLAGS,
686 __NFTA_QUEUE_MAX
687};
688#define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1)
689
690#define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */
691#define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */
692#define NFT_QUEUE_FLAG_MASK 0x03
693
694/**
Patrick McHardy96518512013-10-14 11:00:02 +0200695 * enum nft_reject_types - nf_tables reject expression reject types
696 *
697 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
698 * @NFT_REJECT_TCP_RST: reject using TCP RST
699 */
700enum nft_reject_types {
701 NFT_REJECT_ICMP_UNREACH,
702 NFT_REJECT_TCP_RST,
703};
704
705/**
706 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
707 *
708 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
709 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
710 */
711enum nft_reject_attributes {
712 NFTA_REJECT_UNSPEC,
713 NFTA_REJECT_TYPE,
714 NFTA_REJECT_ICMP_CODE,
715 __NFTA_REJECT_MAX
716};
717#define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
718
719/**
720 * enum nft_nat_types - nf_tables nat expression NAT types
721 *
722 * @NFT_NAT_SNAT: source NAT
723 * @NFT_NAT_DNAT: destination NAT
724 */
725enum nft_nat_types {
726 NFT_NAT_SNAT,
727 NFT_NAT_DNAT,
728};
729
730/**
731 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
732 *
733 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200734 * @NFTA_NAT_FAMILY: NAT family (NLA_U32)
735 * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
736 * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
737 * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
738 * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
Patrick McHardy96518512013-10-14 11:00:02 +0200739 */
740enum nft_nat_attributes {
741 NFTA_NAT_UNSPEC,
742 NFTA_NAT_TYPE,
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200743 NFTA_NAT_FAMILY,
744 NFTA_NAT_REG_ADDR_MIN,
745 NFTA_NAT_REG_ADDR_MAX,
746 NFTA_NAT_REG_PROTO_MIN,
747 NFTA_NAT_REG_PROTO_MAX,
Patrick McHardy96518512013-10-14 11:00:02 +0200748 __NFTA_NAT_MAX
749};
750#define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
751
752#endif /* _LINUX_NF_TABLES_H */